This unit is provided by:
Options
-
[Install]
-
WantedBy=multi-user.target
-
-
[Service]
-
CapabilityBoundingSet=~CAP_AUDIT_CONTROL CAP_AUDIT_READ CAP_AUDIT_WRITE ~CAP_BLOCK_SUSPEND CAP_KILL CAP_LEASE CAP_LINUX_IMMUTABLE ~CAP_MAC_ADMIN CAP_MAC_OVERRIDE CAP_MKNOD CAP_SYS_ADMIN ~CAP_SYS_BOOT CAP_SYS_CHROOT CAP_SYS_MODULE CAP_SYS_PACCT ~CAP_SYS_PTRACE CAP_SYS_RAWIO CAP_SYS_TTY_CONFIG CAP_WAKE_ALARM
-
DeviceAllow=char-pps rw char-ptp rw char-rtc rw
-
DevicePolicy=closed
-
EnvironmentFile=-/etc/sysconfig/chronyd
-
ExecStart=/usr/bin/chronyd $OPTIONS
-
ExecStart=/usr/sbin/chronyd $OPTIONS
-
ExecStartPost=/usr/libexec/chrony/helper update-daemon
-
LockPersonality
Introduced in systemd 235=yes -
MemoryDenyWriteExecute
Introduced in systemd 231=yes -
NoNewPrivileges
Introduced in systemd 239=yes no -
PIDFile=/run/chrony/chronyd.pid
-
PrivateTmp=yes
-
ProcSubset
Introduced in systemd 247=pid -
ProtectControlGroups
Introduced in systemd 232=yes -
ProtectHome
Introduced in systemd 214=yes -
ProtectHostname
Introduced in systemd 242=yes -
ProtectKernelLogs
Introduced in systemd 244=yes -
ProtectKernelModules
Introduced in systemd 232=yes -
ProtectKernelTunables
Introduced in systemd 232=yes -
ProtectProc
Introduced in systemd 247=invisible -
ProtectSystem
Introduced in systemd 214=strict -
ReadWritePaths=/run /var/lib/chrony -/var/log -/var/spool
-
RestrictAddressFamilies=AF_INET AF_INET6 AF_UNIX AF_NETLINK
-
RestrictNamespaces
Introduced in systemd 233=yes -
RestrictSUIDSGID
Introduced in systemd 242=yes -
SystemCallArchitectures=native
-
SystemCallFilter=~@cpu-emulation @debug @module @mount @obsolete @raw-io @reboot @swap
-
Type=forking
-
-
[Unit]
-
After=nss-lookup.target network.target
-
After=ntpdate.service sntp.service ntpd.service
-
Before=time-sync.target
-
ConditionCapability=CAP_SYS_TIME
-
Conflicts=ntpd.service systemd-timesyncd.service
-
Description=NTP client/server
-
Documentation=man:chronyd(8) man:chrony.conf(5)
-
Wants=network.target time-sync.target
-
Additionnal notes
Nothing here.